SSH scans vs connection ratelimiting

Michael Scheidell scheidell at secnap.net
Tue Aug 22 11:33:01 UTC 2006


> -----Original Message-----
> From: owner-freebsd-security at freebsd.org 
> [mailto:owner-freebsd-security at freebsd.org] On Behalf Of Uwe Doering
> Sent: Tuesday, August 22, 2006 4:09 AM
> To: freebsd-security at FreeBSD.ORG
> Subject: Re: SSH scans vs connection ratelimiting
> 
> that someone could fake a complete exchange like this from the remote 
> via a TCP connection while using source IP address spoofing.  My 
> understanding so far is that source IP address spoofing from 
> the remote 
> works only with connectionless protocols like UDP and ICMP, 
> or TCP SYN 
> packets as a special case.  Please correct me if I'm wrong.

You are more or less correct.

For all practical purposes, spoofing a three way tcp connection is
impossible.
(for all practical purposes)

There is man in the middle attacks, routing hijacking, and possibly tcp
connection id spoofing, but if you are using a modern os that does not
suffer from connecting id guessing, its so hard to do that that only
someone specifically trying to break into your network, who has the
ability to sniff your traffic, might even have a ghost of a chance of
doing this.

(and if you already have the *keys from known_hosts, ssh will complain
about it if it even gets that far)
-- 
Michael Scheidell, CTO
561-999-5000, ext 1131
SECNAP Network Security Corporation
Keep up to date with latest information on IT security: Real time
security alerts: http://www.secnap.com/news


More information about the freebsd-security mailing list